You are on page 1of 10

RAND Corporation

Report Part Title: Unifying Tasking, Collection, Processing, Exploitation, and


Dissemination (TCPED) Across the U.S. Intelligence Community
Report Title: Perspectives and Opportunities in Intelligence for U.S. Leaders
Report Author(s): CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN,
MICHAEL H. DECKER and RICHARD C. BAFFA
RAND Corporation (2018)

Stable URL: http://www.jstor.com/stable/resrep20002.5

JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms

RAND Corporation is collaborating with JSTOR to digitize, preserve and extend access to this
content.

This content downloaded from


185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
Chapter 3. Unifying Tasking, Collection,
Processing, Exploitation, and Dissemination
(TCPED) Across the U.S. Intelligence Community

T
he IC’s topline budget amount for fiscal year Prioritization of intelligence-gathering resources is
(FY) 2016, including both base and supplemental only loosely associated with the National Intelligence
budgets, totaled $70.7 billion.1 According to some Priorities Framework (NIPF), the Office of the Director of
experts, the United States spends more on collec- National Intelligence’s (ODNI’s) “primary mechanism to
tion, analysis, and dissemination of intelligence than the establish, disestablish, manage, and communicate national
rest of the world’s intelligence organizations combined.2 In intelligence priorities.”4 Tasking for collection across the
addition to vast financial resources, the U.S. government various intelligence-gathering disciplines is stovepiped
has access to the most-sophisticated intelligence collection within individual agencies and integrated only loosely
technologies in the world; recruits, trains, and sustains a at the national level. Processing and exploitation of col-
highly educated, motivated, and talented workforce; and lected data remain largely disaggregated, while access
currently functions at a higher level of sharing, transpar- to “raw” collection remains limited at best. In practice,
ency, and cooperation than at any previous time in U.S. the intelligence-gathering disciplines, or “INTs,” are not
history. With that said, a limiting factor in our nation’s resourced in direct accordance with the NIPF. The NIPF
ability to realize the full potential of its combined intel- serves as a rough set of guidelines to be cited when useful,
ligence strengths and resources resides in the disaggre- but it is only loosely associated with the day-to-day budget
gated and nonfederated tasking, collection, processing, priorities of the IC. The NIPF only marginally impacts the
exploitation, and dissemination (TCPED) architectures routine tasking of individual INTs within their silos by
and processes used.3 TCPED is the backbone of the IC, the INT functional managers at the agencies who have that
framework on which all intelligence rests. It should be the authority—human intelligence (HUMINT) and OSINT
aggregate of foundational systems and processes that allow at CIA, signals intelligence (SIGINT) at the National
leaders to seek intelligence answers to questions, allocate Security Agency (NSA), geospatial intelligence (GEOINT)
resources, direct analysis and production of finished intel- at the National Geospatial-Intelligence Agency (NGA),
ligence, and deliver it to the appropriate end users at the and measurement and signature intelligence (MASINT) at
appropriate time. DIA—or by National Intelligence Managers at the national

16
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
level (who can look into their own regional or functional individual components within the TCPED processes of the
silo but have little impact on resources or TCPED decisions 17 organizations of the IC,7 as well as an expanded under-
across the entire enterprise). Decentralized acquisition and standing of how TCPED applies to every INT in the IC at
disconnected operations of TCPED architectures further both the operational warfighting and strategic decision-
limit processing, exploitation, and dissemination across making levels.8 The IC could develop a federated approach
the community. For example, sensors flown on unmanned to TCPED that manages centrally but allows for decentral-
aerial vehicles acquired and operated by the military ized execution of all resources across the community. Such
services often do not connect to existing national-level an approach would task and integrate across all collection
IC architectures, preventing analysts across the IC from platforms; make use of all available resources in the com-
benefiting from all data sources. In addition, the U.S. space munity; and allow streamlined access to raw, processed,
and ground architecture includes too few nodes where and analyzed data across the entire intelligence enterprise.
satellite data can be received, processed, and transmitted to Below, we explore how such a process might work, and how
global users in a timely manner. Meanwhile, disconnects it might address some of the problems with the current
across classified domains prevent warfighters on ships, in approach to TCPED.
cockpits, and at forward operating bases from accessing the
most current intelligence in real time.
Discussions of what is required to improve intelligence Federated Tasking?
often focus on increasing topline resources. IC officials Joint Publication 2.0 describes how TCPED supports, or
have historically argued that the IC budget is too small, should support, the Joint Force Commander’s (JFC’s) abil-
considering that the IC cannot or struggles to answer many ity to achieve operational success over an adversary:
policymaker questions on a timely basis.5 Other experts
argue that additional dollars do not necessarily translate To prevail, the JFC’s decision and execution cycles
must be consistently faster than the adversary’s and
directly into improved intelligence. In a progress review of
be based on better information. Being faster and bet-
the Intelligence Reform and Terrorism Prevention Act of
ter requires having unfettered access to the tasking,
2004 (IRTPA), Richard Best of the Congressional Research collection, processing, analysis, and dissemination of
Service cautioned members of Congress to temper their information derived from all available sources.9
expectations: “It should be remembered that intelligence
analysis is an intellectual exercise; it is not possible to Similarly, the availability of intelligence information
increase budgets by 50 percent and receive 50 percent bet- can be crucial to strategic decisionmaking at the national
ter analysis in the next fiscal year.”6 and operational levels.
One of the things required to improve intelligence Unfortunately, tasking for either collection or analytic
is neither growth nor diminution of the IC’s budget but production across the intelligence enterprise is far from
rather a federating and unifying of the collective and federated, and commanders and decisionmakers seldom

17
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
have access to “all available sources.” On any given day, IC decisionmaking more time-consuming and sometimes
analysts from one organization may be seeking the answers more difficult.10
to an intelligence question that was answered by collection The same system that results in duplicative analyses
or analysis conducted in another organization days, weeks, could also prevent analysis from reaching those who need
or even months earlier. This duplication of effort occurs it. There are many reasons that access to information might
because responses to ad hoc collection or production tasks be blocked: Some information remains stovepiped because
are generally not cataloged or codified inside a single of real or perceived requirements to protect sources and to
organization, let alone across the entire IC, and thus are ensure continued access to the information, some analytic
not discoverable. Improving such discoverability might be products are created in-house for organizational leaders
accomplished by improving technological systems or oper- only and never shared beyond the organization’s walls, and
ational processes, but it might also be improved by recon- other information is marginalized or relegated to long-term
sidering the actual organization and individual missions of internal storage by the originating organization because
the component agencies of the IC. it is perceived as not germane to other organizations’
While duplication of effort is itself a problem, an missions.
equally serious issue is the possibility that different answers Theoretically, in a “perfect universe,” all collection and
might be provided to the same question. Although in some production tasking could be federated at the national level
cases multiple analyses of the same data by separate orga- and passed to the organization with the most efficient and
nizations can provide alternative analyses for consideration effective means of collecting or producing against the task.
by commanders and policymakers, decisionmakers are The results of all analyses would be made available to all
often frustrated by duplicative, repetitive, or contradictory with a need to know, such that decisionmakers would have
intelligence analyses that make their consideration and access to “all available sources.”
In the real world, however, where intelligence resources
are limited, the volume and variety of sources of informa-
tion are nearly infinite, and the ability to determine which
organization’s collection methods, assets, sources, or ana-
The same system that lysts are best suited to a particular task, federation remains
beyond the IC’s grasp except in limited circumstances
results in duplicative where IC-wide surges or task forces divide the labor across
multiple organizations. Some federation occurs among
analyses could also functional managers within the INTs, national intelligence
managers within regions and functions, and IC organiza-
prevent analysis from tions at the macro level; true federation, however, remains

reaching those who need it. elusive.

18
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
Too Much Collection?
Some experts express concerns that the IC collects too Collecting only the
much information—more than it can process, translate, or
analyze, and certainly more than it can effectively utilize.
information required is
Leaving aside recent arguments about excessive intelligence
collection being a threat to civil liberties and privacy, col-
much more difficult than
lecting more information than the IC enterprise can rea-
sonably process may be a waste of precious resources and
collecting it all and sifting
likely adds to the burden of analysts and analytic tools that through it after the fact.
are already overtaxed trying to process and make sense of
the volume of data pouring in daily.11
While it is true that the volume of information now Stovepiped Processing and
available in the world exceeds the IC’s capability to collect Exploitation?
and process, it does not necessarily follow that there needs Federating the stovepipes of collection and processing
to be a reduction in collection. If you are looking for a nee- within the IC is not a new idea. The House Permanent
dle in a haystack, you need to collect the entire stack of hay Select Committee on Intelligence (HPSCI) released a staff
to find the needle. It does not matter how many people or study in April 1996 titled IC21 that spoke directly to this
tools you use to sift through a half-stack—if the needle is in issue:
the other half, you will never find it. In the case of the IC,
analysts are looking for tens of thousands of needles every The most common criticism of the current collection
management process, and one in which we concur,
day in billions of incomplete haystacks across 17 organiza-
is that it is dominated by “stovepipes,” i.e., types of
tions and within hundreds, potentially thousands, of inter-
collection that are managed so as to be largely dis-
nal silos of information.12 Collecting only the information
tinct from one another. There are several net results.
required is much more difficult than collecting it all and First, the collection disciplines become competi-
sifting through it after the fact. The answer to the reputed tors for resources driven as much by bureaucratic
problem of “too much collection” resides not in reducing imperatives as by a broader national need. Second, it
information intake, but in federating and expanding the also becomes much more difficult to make educated
capabilities, tools, and processes used to manage and task IC-wide decisions about overall collection needs and
searches within the various “haystacks,” and to exploit and the resources required to implement them.13
disseminate the “needles” as they are found.
Some improvements have been made across the IC in
discoverability and access to information since the prom-
ulgation of ICD 501,14 but processing and exploitation of

19
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
data remain largely stovepiped, both in storage location machine reading capabilities, search algorithms, automated
and accesses through “stewards” and in the capabilities and translation, image detection, and the like are making
tools used to process the available information.15 What the human first-looks less important, but until we get to a point
HPSCI observed more than two decades ago as a problem where the machine tells us when it has collected something
involving increasing collection management and analysis we are interested in, we should use all the human capability
has expanded into a larger issue of stovepiped processing we have at our disposal.
and exploitation. Similarly, while new tools and applications have
ICD 501 requires, with some exceptions, that IC ele- allowed NGA to exploit and disseminate increased
ments use “automated means” to make “discoverable” to amounts of imagery for use in the IC, the volume of imag-
authorized IC users all intelligence and intelligence-related ery collected each day far exceeds the capacity of NGA
information that they are authorized to “acquire, col- analysts to view, analyze, or comment on all but the most
lect, hold, or obtain,” or analysis that an IC element is critical, time-sensitive images. All-source analysts in other
authorized to produce.16 This directive was promulgated IC agencies continue to have limited access to unprocessed
in response to congressional mandates in the IRTPA to or not-yet-released imagery collected by NGA, and even
“strengthen the sharing, integration, and management of less access to images or data collected elsewhere by U.S.
information within the Intelligence Community.” However, intelligence, surveillance, and reconnaissance (ISR) assets.
realities within the IC suggest that discoverability is far Add to the volume of data collected by national
from perfect, access and processing in real time is all but technical means the even greater volume of data available
nonexistent, and automated means of discovering another through commercial ISR platforms and openly available
agency’s most closely held or originator-controlled secrets on the internet, or crowdsourced and uploaded as needed
are still hampered by a system of stewards, gatekeepers, by billions of smartphones and other sensors around the
and internal processing decisions. planet—and it becomes even more obvious that analysts, let
Consider SIGINT collected by NSA from a foreign alone commanders and decisionmakers, do not have access
source and in a foreign language. NSA possesses processing to all available sources of information.
tools, language analysts, and analytic capabilities to locate,
translate, process, and disseminate in English the infor-
mation that it collects for use by analysts in the rest of the Absence of a Central Dissemination
IC. But despite NSA’s exquisite capabilities, only a fraction Clearinghouse
of the SIGINT it collects ever gets processed, translated,
The 1996 HPSCI IC21 Staff Study suggested that the lines
or disseminated.17 While analysts in other agencies might
between single-source analysis (such as SIGINT and
have language skills that would allow them to help process
IMINT) and all-source analysis were beginning to blur
and analyze the data NSA collects, most have very limited
and that there needed to be greater clarity in analytic
access to NSA’s “raw” collection. Increasingly, advanced
roles for each of the INTs and “in relationship to one

20
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
another.”18 Today, the problem still exists but might be
better described as a need to refine the roles that individual
analysts must play regardless of where they sit in the IC’s
The IC lacks truly
organizational chart. centralized mechanisms
Many of the unique skills and missions that were once
the purview of individual agencies have begun to blend for disseminating the
together. NGA is responsible for providing GEOINT, “the
exploitation and analysis of imagery and geospatial infor- nation’s most timely and
mation that describes, assesses and visually depicts phys-
ical features and geographically referenced activities on relevant assessments.
the Earth.”19 NSA provides SIGINT, “foreign intelligence
from communications and information systems,” for use Unified TCPED: The Future of
by decisionmakers across the U.S. government.20 Given this
Intelligence
division of responsibilities, is a geo-rectified digital feed
that includes foreign language narration and launch video As new technologies emerge and improvements are made—
at a foreign missile installation the purview of NGA, NSA, in machine learning and machine translation, artificial
or both? And if an analyst at CIA or DIA has the tools and intelligence, big data sorting and processing capabilities,
language capability to process and analyze the information still image and video facial recognition, change detection
before NSA or NGA can get to it, should that information algorithms and other processing, and exploitation and
not be made available for exploitation and dissemination analytic tools not yet imagined—analysts could become
sooner rather than later? ever more capable of working with, exploiting, process-
ODNI was created to oversee the 17-organization IC ing, and analyzing even greater volumes of information
and “improve information sharing, promote a strategic, and producing and disseminating higher-quality and
unified direction, and ensure integration across the nation’s more-timely intelligence analyses. In an IC of the future—
IC.”21 Yet, apart from long-term assessments produced fully networked and connected to all available sources
by the NIC, which falls under the purview of ODNI, the of information—individual analysts and analytic teams
IC lacks truly centralized mechanisms for disseminat- might have the flexibility to use the skills and tools at their
ing the nation’s most timely and relevant assessments. disposal to respond to decisionmakers’ most critical intelli-
Policymakers and warfighters must sift through and sort gence needs.
hundreds of daily assessments and determine on a contin- In the interconnected, “internet-of-things” 21st cen-
uous, individual basis which assessments to believe and tury, it might be time to question why geographic location
which to set aside as “alternative.” or agency designations should matter at all. In the black-
and-white analog IC of the not-too-distant past, imagery

21
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
analysts squinted through lenses at backlit photographs accurate intelligence to make informed decisions, but they
to interpret imagery nuances that would be missed by the should not have to use their limited time to ponder which
untrained eye of an all-source analyst. Similarly, crypto- agency seal to revere above others when presented with
logic language analysts would hit replay repeatedly as they alternatives.
struggled to differentiate foreign language and nuanced Jack Davis, in his occasional papers on the “founder”
meaning from background noise in voice recordings. of modern U.S. intelligence analysis, Sherman Kent,
Today, however, nearly all data are digital; exploitable; suggested that Kent would say that it is the first responsi-
capable of being processed by myriad tools, techniques, bility of IC analysts to accommodate clients by producing
and technologies; and easily shareable with allies and assessments timed to their decision cycle and focused on
friends around the world as needed. their learning curve.22 Kent would also urge, Davis asserts,
While individual IC agencies continue to believe that analysts “allow time for Directorate, Agency, and,
that what they collect and the sources and methods they when appropriate, Community coordination” to permit
use should be protected from wide dissemination, the IC challenges to and refinement of data and to accommodate
should be as agnostic about where data are processed or “collective responsibility” in the IC.23 Within these two
exploited as decisionmakers of the future are likely to be thoughts lies the notion that it is the first responsibility of
about the individual agency provenance of their intelli- the IC, writ large, to accommodate clients by producing
gence feeds. Decisionmakers require relevant, timely, and collective assessments, where appropriate, timed to their
decision cycles.
The highest order of intelligence produced for U.S.

The IC should be as decisionmakers has been collective in nature. National


Intelligence Estimates, IC memoranda, and Sense of the
agnostic about where data Community memoranda all benefit from the collective
assessment of the IC. In recent years, the President’s Daily
are processed or exploited Brief (PDB) evolved for a time to include assessments pro-
duced by analysts across the IC, coordinated with multiple
as decisionmakers of agencies, and edited and polished by a single, national-level
PDB staff. The highest-ranking decisionmakers in the
the future are likely to nation have traditionally been given the same collective
wisdom of the IC in its entirety, even as many below the
be about the individual level of Department Secretary or Joint Chiefs of Staff have
received daily books filled with individual agency assess-
agency provenance of ments and predictions.

their intelligence feeds.


22
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
Imagine an IC of the future collectively working sources. A greater volume of collected data would be
against a living and ever-evolving set of intelligence discoverable and available for processing and exploitation
requirements; collecting and providing unclassified and by analysts and warfighters regardless of their geographic
classified data in a single, unified system accessible to location or agency affiliation, if such affiliations were
analysts with appropriate clearance and need-to-know; even to remain necessary. This might require creation of
and working through intelligence problems with other an entity at ODNI enabled with “super user” access to all
U.S. and possibly allied analysts, wherever they are in the sources and methods and empowered to direct unification
world, to produce intelligence information that is easily of TCPED across the IC. Creation of a TCPED ombuds-
accessible and discoverable by analysts, warfighters, and man role to adjudicate inevitable conflicts might also be
decisionmakers around the globe. For such a fantasy to considered. Dissemination of analysis would be centralized
ever become reality, agency seals and stovepipes would to provide the collective best efforts of the IC, but would
have to be permanently replaced with national interest and continue to include alternative analysis or dissenting views
collective enterprise in a unified IC TCPED construct. for consideration without prejudice.
Eventually, even the concept of individual INTs, which
currently compete for limited resources within the IC,
Concluding Thoughts might give way to a larger concept of intelligence domi-
Unified TCPED would combine centralized tasking across nance through unified TCPED, focused more on finding
multiple subordinate collection organizations with col- needles than building and storing haystacks.
lection management systems that would be “aware” of
other complementary collection efforts without revealing

23
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms
12
Chapter Notes Hundreds of internal databases and silos exist within the IC at the
national level, thousands likely exist across the military services and
1
Office of the Director of National Intelligence, “U.S. Intelligence Com- other subcomponents of the Departments of Defense, State, Homeland
munity Budget,” 2018. Security, Treasury, etc.
2
Anne Daugherty Miles, Intelligence Community Spending: Trends and 13
U.S. House of Representatives Permanent Select Committee on Intel-
Issues, Washington, D.C.: Congressional Research Service, November 8, ligence, 104th Congress, IC21: The Intelligence Community in the 21st
2016. See also Bernd Debusmann, “U.S. Intelligence Spending—Value Century, June 5, 1996.
for Money?” Reuters, July 16, 2010. 14
Intelligence Community Directive 501, Discovery and Dissemination
3
The use of the term federated here refers to a number of organizations or Retrieval of Information within the Intelligence Community, Wash-
being formed into a single centralized unit, within which each organiza- ington, D.C.: Office of the Director of National Intelligence, January 21,
tion keeps some internal autonomy. 2009.
4
Intelligence Community Directive 204, National Intelligence Priorities 15
Analysts at IC agencies have more ability than ever to discover infor-
Framework, Washington, D.C.: Office of the Director of National Intelli- mation related to their work that may be protected by another agency,
gence, January 2, 2015. and they have some capability to request release of details from the orig-
5 inating agency, but much information that does not need to be highly
The FY 2018 National Intelligence Program budget request is 7.5 per-
protected remains inaccessible. Raw SIGINT or unprocessed IMINT, for
cent higher than the budget requested for FY 2017.
example, is mostly not accessible to analysts throughout the community
6
Richard A. Best, Intelligence Reform After Five Years: The Role of the except through specific requests.
Director of National Intelligence, Washington, D.C.: Congressional 16
Intelligence Community Directive 501, 2009.
Research Service, June 22, 2010.
17
7 Barton Gellman, Dafna Linzer, and Carol D. Leonnig, “Surveillance
Executive Order 12333, United States Intelligence Activities, Washing-
Net Yields Few Suspects,” Washington Post, February 5, 2006.
ton, D.C.: The White House, December 4, 1981, amended July 30, 2008.
18
8 U.S. House of Representatives Permanent Select Committee on Intel-
The major intelligence disciplines considered in this chapter are
ligence, 1996.
HUMINT, SIGINT, GEOINT, MASINT, and OSINT. (Other or sub-
INTs include electronic intelligence [ELINT], technical intelligence 19
National Geospatial-Intelligence Agency, “About NGA,” undated.
[TECHINT], cyber intelligence [CYBINT], financial intelligence 20
[FININT], and imagery intelligence [IMINT], but these are not specifi- National Security Agency, “Frequently Asked Questions: Signals Intel-
cally discussed in this chapter.) ligence (SIGINT),” last modified May 3, 2016.
21
9
Joint Publication 2.0, Joint Intelligence, Washington, D.C.: Chairman of Office of the Director of National Intelligence, “ODNI Fact Sheet,”
the Joint Chiefs of Staff, October 22, 2013. October 2011.
22
10
Concerns over contradictory and duplicative analyses predate the IC Jack Davis, Sherman Kent and the Profession of Intelligence Analysis,
and the National Security Act of 1947 as amended. For CIA’s account of Washington, D.C.: Central Intelligence Agency, Sherman Kent Center
President Harry S. Truman’s frustrations on these matters in 1946, see for Intelligence Analysis, Occasional Papers, Vol. 1, No. 5, November
Central Intelligence Agency, “The Beginning of Intelligence Analysis in 2002b.
CIA,” undated. 23
Jack Davis, 2002b.
11
Gary Sullivan, “Too Much of a Good Thing,” Baltimore Sun, August 27,
2014. See also Alex Young, “Too Much Information,” Harvard Interna-
tional Review, August 20, 2013.

24
This content downloaded from
185.48.148.204 on Wed, 13 Sep 2023 17:32:11 +00:00
All use subject to https://about.jstor.org/terms

You might also like